Login / Signup
E-Commerce Authentication: An Effective Countermeasures Design Model.
Victor D. Sawma
Robert L. Probert
Published in:
ICEIS (3) (2003)
Keyphrases
</>
countermeasures
computational model
databases
case study
semi supervised
network structure